• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.029 seconds

Design and Implementation of MPλS Simulator based on ns-2 Network Simulator (ns-2 네트워크 시뮬레이터 기반의 MPλS 시뮬레이터의 설계 및 구현)

  • 서선영;이봉환;황선태;윤찬현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.119-128
    • /
    • 2003
  • The rapid increase of Internet users, diversity of application services, high speed data transmission, and extension of application areas have resulted in exponential growth of Internet traffic. In order to satisfy the increasing demand of bandwidth, the MPλS protocol, which is based on MPLS for efficient integration of WDM and IP protocols, has been suggested by IETF. In this paper, we present an MPλS simulator which enables to simulate various MPλS function such as optical crossconnect (OXC), multi-wavelength links, routing and wavelength assignment(RWA), and MPλS signaling and control. The simulator is developed based on the ns-2, an widely used multi-protocol network simulator. The function of the simulator is validated by running many simulation based on various scenarios and performance measures such as throughput and blocking probability. The simulator could be widely utilized for validation of proposed protocols before developing real optical network systems.

Dynamic CSMA Protocol Based on the Network Status (네트워크 상태에 따른 동적 CSMA 프로토콜)

  • Lee, Wang-Jong;Rhee, Seung-Hyong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • CSMA(Carrier Sense Multiple Access) is a media access control protocol when nodes use a shared channel. To reduce the probability of collision and increase the performance, the station lust checks the state of the channel. In this paper, we study the performance improvement method based on p-persistent strategy. The p-persistent method reduces the chance of collision and improves the efficiency. However, a probability p and the number of station affect the performance. This paper proposes a dynamic CSMA multiple access based on the network status. If the possibility of collision is low, the station increases the probability p to improve the performance. In the opposite case, the station decreases the probability p. Our simulation results show that the proposed scheme outperforms any methods of CSMA multiple access according to the current persistent strategy.

  • PDF

Real-Time Transmission Scheme for Ad Hoc Self-Organizing (ASO) TDMA in Multi-Hop Maritime Communication Network (Ad Hoc Self-Organizing (ASO) TDMA 방식 다중-홉 해양통신망에서의 실시간 전송 기법)

  • Cho, Kumin;Yun, Changho;Lim, Yong-Kon;Kang, Chung G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.260-270
    • /
    • 2014
  • In this paper, we first analyze the delay performance of Dynamic Space-time Subframe (DSTS)-based frame structure which has been proposed to support the real-time service as well as non real-time service, using Ad hoc Self-Organizing Time Division Multiple Access (ASO-TDMA) MAC protocol, especially when transmitting a MAC SDU with two or more MAC PDUs, in a multi-hop ad-hoc maritime communication network. We propose two key transmission schemes: contiguous DSTS reservation which guarantees the end-to-end delay for the multiple PDUs, and adaptive transmission probability control schemes to maximize the system throughput. Our simulation results show that the proposed schemes outperform the system throughput of the existing transmission schemes, while supporting the real-time requirement.

Testbed Implementation and Performance Evaluation of High Speed Transport Protocols using TEIN2 Networks (TEIN2를 활용한 고대역 전송계층 프로토콜 테스트베드 구축 및 성능 분석)

  • Lee, Gi-Ra;So, Sang-Ho;Choi, Yun-Chul;Park, Man-Kyu;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.104-113
    • /
    • 2009
  • Recently, high-speed Internet users and broadband network infrastructure are increasing. However, the TCP protocol widely used in the Internet is an appropriate transport only for the legacy Internet, it is inefficient for traffic transport for network environments with large bandwidth-delay product. In order to remedy this problem, there have been many researches about improved congestion control algorithms for broadband networks. In these studies, most of performance evaluation has been done by simulations. In this paper, after we reviewed the proposed high bandwidth transport layer protocols, we implemented a real testbed, measured the performance and analyzed the problems of high-speed transport protocols through the international research network TEIN2 between three nations, Korea, China, and Germany.

Performance Analysis of Relay-Based Shipboard Wireless Communication Systems (릴레이 기반 선내 무선통신 시스템의 성능 분석)

  • Joo, Yang-Ick;Kim, Beom-Mu;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.202-208
    • /
    • 2015
  • A wireless ship area network is required to configure and control various sensors and electrical instruments embedded or boarded in a ship. In such environment, wireless communication protocol adopting relaying function is needed because direct link or communication between two nodes is hardly guaranteed due to spatial constraints in a ship. In this study, we introduce and analyze a WiMedia Distributed MAC (D-MAC) based approach considering throughput and energy constraint of wireless communication module. Performance evaluation results demonstrate that the relay-based wireless communication protocol improves reliability of wireless communication network in a ship.

Ethernet Port를 이용한 차량 진단 모니터링 시스템의 설계

  • Shin, Ju-Young;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.98-101
    • /
    • 2009
  • Recently, there is use of the vehicle network for vehicle diagnostic method and Increased use of the vehicle protocol such as (CAN(Controller Area Network), MOST, LIN, FlexRay), Distributed control and data about the vehicle are being sought methods for real-time observation and monitoring and trend tends to have gone into this. In this case of automotive diagnostic module in today, there is Primarily to use DLC(Data Link Connector)Connector called self-check terminal. Generally, vehicle Diagnoses to use DLC Connector such as OBD2(On Board Diagnostics) Through Diagnostic Module(scanner). But there limit diagnostic as engine and powertrain part, and not consider user's perspective In this paper, By designing Vehicle diagnostic monitoring system using Ethernet Port, transmit and Receives CAN protocol vehicle data, and implement Easily monitoring system that provide and Diagnoses to provide vehicle's state and information to use PC.

  • PDF

Equal Energy Consumption Routing Protocol Algorithm Based on Q-Learning for Extending the Lifespan of Ad-Hoc Sensor Network (애드혹 센서 네트워크 수명 연장을 위한 Q-러닝 기반 에너지 균등 소비 라우팅 프로토콜 기법)

  • Kim, Ki Sang;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.269-276
    • /
    • 2021
  • Recently, smart sensors are used in various environments, and the implementation of ad-hoc sensor networks (ASNs) is a hot research topic. Unfortunately, traditional sensor network routing algorithms focus on specific control issues, and they can't be directly applied to the ASN operation. In this paper, we propose a new routing protocol by using the Q-learning technology, Main challenge of proposed approach is to extend the life of ASNs through efficient energy allocation while obtaining the balanced system performance. The proposed method enhances the Q-learning effect by considering various environmental factors. When a transmission fails, node penalty is accumulated to increase the successful communication probability. Especially, each node stores the Q value of the adjacent node in its own Q table. Every time a data transfer is executed, the Q values are updated and accumulated to learn to select the optimal routing route. Simulation results confirm that the proposed method can choose an energy-efficient routing path, and gets an excellent network performance compared with the existing ASN routing protocols.

A Practical TCP-friendly Rate Control Scheme for SVC Video Transport (SVC 비디오 전송을 위한 실용적인 TCP 친화적 전송률 제어 기법)

  • Seo, Kwang-Deok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.2
    • /
    • pp.114-124
    • /
    • 2009
  • In this paper, we propose a practical TCP friendly rate control scheme that considers the minimum channel bandwidth of the network when transporting SVC (scalable video coding) video over IP netowrks such as Internet. RTP and RTCP is mainly designed for use with UDP (User Datagram Protocol) for real-time video transport over the Internet. TCP-friendly rate control was proposed to satisfy the demands of multimedia applications while being reasonably fair when competing for bandwidth with conventional TCP applications. However the rate control model of the conventional TCP-friendly rate control scheme does not consider the minimum channel bandwidth of the network. Thus the estimated channel bandwidth by the conventional rate control model might be quite different from the real channel bandwidth when the packet loss ratio of the network is very large. In this paper, we propose a modified TCP-friendly rate control scheme that considers the minimum channel bandwidth of the network. Based on the modified TCP-friendly rate control, we assign the minimum channel bandwidth to the base layer bitstream of SVC video, and remaining available bandwidth is allocated to the enhancement layer of SVC video for the TCP friendly scalable video transmission. It is shown by simulations that the modified TCP-friendly rate control scheme can be effectively used for a wider range of controlled bit rates depending on the packet loss ratio than the conventional TCP-friendly control scheme. Furthermore, the effectiveness of the proposed scheme in terms of objective video quality is proved by comparing PSNR performance with the conventional scheme.

Detecting LDoS Attacks based on Abnormal Network Traffic

  • Chen, Kai;Liu, Hui-Yu;Chen, Xiao-Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.7
    • /
    • pp.1831-1853
    • /
    • 2012
  • By sending periodically short bursts of traffic to reduce legit transmission control protocol (TCP) traffic, the low-rate denial of service (LDoS) attacks are hard to be detected and may endanger covertly a network for a long period. Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost. Recent researches divert focus from the attack stream to the traffic anomalies induced by LDoS attacks, which can detect more kinds of attacks with higher efficiency. However, the limited number of abnormal characteristics and the inadequacy of judgment rules may cause wrong decision in some particular situations. In this paper, we address the problem of detecting LDoS attacks and present a scheme based on the fluctuant features of legit TCP and acknowledgment (ACK) traffic. In the scheme, we define judgment criteria which used to identify LDoS attacks in real time at an optimal detection cost. We evaluate the performance of our strategy in real-world network topologies. Simulations results clearly demonstrate the superiority of the method proposed in detecting LDoS attacks.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.